学位论文详细信息
Network-aware mechanisms for tolerating Byzantine failures in distributed systems
Byzantine agreement;Consensus;Fault-Tolerance;Broadcast;Watchdog;Capacity;Distributed Algorithms;Distributed Systems;Equality
Liang, Guanfeng
关键词: Byzantine agreement;    Consensus;    Fault-Tolerance;    Broadcast;    Watchdog;    Capacity;    Distributed Algorithms;    Distributed Systems;    Equality;   
Others  :  https://www.ideals.illinois.edu/bitstream/handle/2142/31012/Liang_Guanfeng.pdf?sequence=1&isAllowed=y
美国|英语
来源: The Illinois Digital Environment for Access to Learning and Scholarship
PDF
【 摘 要 】

Given the growing reliance of industry and government on online information services such as cloud computing and data centers, efficient fault-tolerance algorithm design is of increasing importance in both industry and academia. In this dissertation, we present some of our efficient fault-tolerant algorithms for distributed systems under both point-to-point and broadcast communication models.For the point-to-point model, we mainly consider Byzantine agreement algorithms. We develop algorithms that require only O(nL) total bits of communication for achieving agreement of L bits among n nodes for sufficiently large L, without making any cryptographic assumption. Previous algorithms either have higher communication cost or rely on cryptographic assumptions. We also develop Byzantine agreement algorithms that perform well when the communication links in the network are capacity-constrained. We develop the first Byzantine broadcast algorithm that achieves constant fraction of the optimal throughput in general point-to-point networks. For some special class of networks, we develop algorithms that achieve the optimal throughput. We then study the communication complexity of the multiparty equality function, which is the core of the Byzantine agreement problem.For the broadcast model, we study the problem of detecting packet tampering attacks in multi-hop wireless networks. We propose a lightweight detection scheme that integrates the idea of wireless watchdogs and error detection coding. We show in a single flow example that even if the watchdog can only observe a fraction of packets, by choosing the encoder properly, an attacker will be detected with high probability while achieving throughput arbitrarily close to optimal. The trade-off between throughput and security in a more practical setting – there are multiple data flows in the network and a distributed random access MAC protocol is used – is also studied.

【 预 览 】
附件列表
Files Size Format View
Network-aware mechanisms for tolerating Byzantine failures in distributed systems 966KB PDF download
  文献评价指标  
  下载次数:19次 浏览次数:47次